Analysis

  • max time kernel
    118s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:54

General

  • Target

    ea749825dbeff15b30a733c4505514fb_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    ea749825dbeff15b30a733c4505514fb

  • SHA1

    983cf7614bccf1f9dc736912747ec2cd3f5e3627

  • SHA256

    498cea45e4cd6ee432e71943548de2861e75062b5d1e4101da66d14c515004b4

  • SHA512

    c3c8e3f1c13ffeee3b6df6fb8fd62f2a96c26f224aa862d47e1d3960bd8d7132df131a3d0388756ad8efd6464284221b19ff7dfd4b8e38bd3bdbff0c827c2025

  • SSDEEP

    3072:TJjlBdwsu7LTaoczAyTB316K9VeHgH/cnAIEm8WfLMKI2esSnXDlzMV:TJjTqD/Nc0yT7AH+cAIEm8OMKzeZnXDg

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea749825dbeff15b30a733c4505514fb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea749825dbeff15b30a733c4505514fb_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\ea749825dbeff15b30a733c4505514fb_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ea749825dbeff15b30a733c4505514fb_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\AppData\Roaming\Nyueur.exe
        "C:\Users\Admin\AppData\Roaming\Nyueur.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Users\Admin\AppData\Roaming\Nyueur.exe
          "C:\Users\Admin\AppData\Roaming\Nyueur.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2164
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    221bc4d412f4efde840a709417db3f94

    SHA1

    c019a7bdc45d5c0bed93f8abf594c9be59ff0bf6

    SHA256

    fc47ce8258ffc6d3141766ff2f4ea7e7c72c28459674e4a7c1c2d6967625d1d6

    SHA512

    93f56c93f125df715c5ccdd5997dbb353b50c8bd8499c39e54c7e1857482c50594c5f24523f90ff8c99f36658a05cd5016ff0066cc9a64e5a86e3e23a7b63cad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afca5e1befea6b76e9692f9d96d84264

    SHA1

    5365db4900bbb630ce4f5947ad394499eeb23f42

    SHA256

    ced70586d7f076b7fca66696c6fcb348eb1673883dd0a163cf333bcfbee4ec01

    SHA512

    f43bfa08d1b377bca4cbe3f008d9c8c12f7cba6fe07db0e883fcd2e4fc65ecb7ca470c44825ce6759b4e279b3236c43de3c10a42d28c9b6e9c7b730ed0a1c7d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    383e9d3669b1c0b2a4ab7e1bb75d31d5

    SHA1

    de2ee4aec8fe283f53271fbf6e7a99f09c91f185

    SHA256

    c119f73920dcf23a51fbac098e15a5eb0fff7117b3743da35fb207448f8d2bcc

    SHA512

    584b919be1bd22bae55776c61ff771855b226e55e33818ffab6be411953947ff3bf9a61a2b58f43883daec39e80e445a85be33db0d6cca1dc0b8e515c4eaa09f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6525d40a0154cef0c19b728ed778a1e3

    SHA1

    712b7768fbd1b0e3c35958c85d4554a389e95d9f

    SHA256

    56e56f5c19065797a820ae049a64b10ebd60b72ef681aed178af1d77071a1ec8

    SHA512

    e3bc4a41b9250a3ced39fdeed4155aae8d25dd03a3c8de7e83958f0a37440bb4b0eef8ed6b4c40736b3257f3e815af6237428fcd5f39db06c8148b1512c6d753

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e796100fa14eb57adc3931da58cf2a31

    SHA1

    d998987d058661d936346ae14baea2c652b1c394

    SHA256

    c261318700ef14e6674e8ad5e462cd20ff82b2476c647cb3ba990c71372d8de5

    SHA512

    51cb831e3c21b74f48b22e340361e0173c0df9ba06a7d01fd10f90a5cdbe86da9eac4be775d6de200c364c96374ce7fda9a4e6ac62ca2018f7a0a873b16d5874

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39b7d51b6ae97c57cb19179f8af2228f

    SHA1

    e228e100ea631216f033bed523b3772f9dd33f0d

    SHA256

    1d3f1821362a5503340f772b0d97a76784cb9a51e34f4457024ff038dbc2f299

    SHA512

    f88df82dd5d508b1181522dfc16ad4ec26c22ba82fa67e48abb9abc0a52e6a789df56854a7f85c153b2908cad8b7c35eed76840e7bd4afb4fe090cc2d37b7695

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61800637dacc8bea956071912a15416e

    SHA1

    aafe82f5417f957913486043896887265a536798

    SHA256

    58fb0559d34726e689fc4c0308cf9cb841cc86a680bce37305d36489bbee3ed4

    SHA512

    5291e1461b0971d8473376da330a4384e602899505fd05c2a0841634344fed5af0a0584a67ecd7bfc00523930dda96f43f53ac8ccf32bfd26b7c7a4b264b1a62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bf7edaead3e90fd012e0e1ffa4ec0be

    SHA1

    8be718a3fe89b5963d5fd35647cc558bf48f5cfb

    SHA256

    3dc4379f61b95dd6724fc9d5fa94e01e4940b7282c7f1d7948b4584d6873a0e9

    SHA512

    76cd144a8cb3d21f0c08d042b8c24cea6287f6adf6c63b6477e8155899a2895be2ea60fc8add5145f3d67b8fa489c1c3c0ed4d030fa5fa0d6f550e7abf274c90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abedfaf4372842d199ba4e31c2bee1b0

    SHA1

    f60bf9264b642df5b4ffae54c0882ed3789f8118

    SHA256

    027200b1feeee54429a898e0d3c34b24be945d0bfaa767157e6cf1d590e16aa7

    SHA512

    23331f8ffa449a293efb8b5b14679b6fdd6cc20f89c019c6830c5333db390b93eb7861a1efca2a1a6c7bc91b8d5af931fdd37cdf27652a53e955eb86993a3f7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f1e202d187fa833ba92ee6404230008

    SHA1

    3e83b23287b3c1ecf03c08911c727c4b0b36453b

    SHA256

    26e9e7bf7d25c8a65b7072463a6be088d53b106346be62e543b9e8a5bed2db3a

    SHA512

    39a102ede08ee04ca72ecf127efd865c8dc6ac9c0cfbdc4f3e8bb83e203136b65b16a98683bccfbd66d559839d07054ecbaf3bd188ec0b9c12dd0cf639547393

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09ee5252e36cd6214ca85c41e0e97ee1

    SHA1

    ce9d1f3a68996ef626d340452358df38ae54a3de

    SHA256

    dc992fef9d273397f85f4f6773a975d4fb1a1e377250fdeebc25fae58b02ef14

    SHA512

    3f50144e07d5464ec2784a2926997a5891b17fbe7921c498290fbbeff2f3dc500bd3e54d9bf0ef17cf907e257f10b725fd8caed96cb62eef44f676dd2c5eff92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ef58feac8d1cd875cda147553a99508

    SHA1

    cb9ad3429fe3285ba5bf4b638acf92514313a58c

    SHA256

    6a10fb69a600da54ff77e7d62f2c1a42262f852afa17d5f96554c6927ad1d88f

    SHA512

    0f77fa007c99f142ed04f5d07b65591c96f340e0596445498e52646980c3a37f7a9ff7c9c3fda77fedea3860cc490660087a0565a9f164774cfe268978b53201

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa6c77cfc9d358f7886a678bef6abee3

    SHA1

    492a061663819a17bc58f412648e99440163a8ec

    SHA256

    2463da9462ce6b86858bc7590594577bf84f188d868824ff13b82c0344821681

    SHA512

    f5c8d57af2ceec542894455007db3dd34a20c00bf8439b0872a387971f453024107828fdbf9905a070ee56fbaa9465809db87c23cb440ba6e03e4d5866c9c35a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f30dd057435b3839d0de242199661cb

    SHA1

    a31c51f67924d4c4fe077438d86a561e86b679ba

    SHA256

    9622d21efdb38fb0aec63c5a9fd5dabb27c59f5ab4f5d753f98bd0a2f1190b71

    SHA512

    70d3fb3542101b13e92e5a5e4cedeb7f726c4494c65596ac37f13ba8175dda0f11c72207eb1ea97f8742f4fed8cfe2e3f4245632755893f05e85fd4e57323cbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f1d8421e4dacf45db755b89b729728f

    SHA1

    fd21fd6cf52364acb49c23ca56dfe944a1356079

    SHA256

    de1231b27c5cb115f8558a5cb88a82cea204007994229300f5dd47f72d913ebb

    SHA512

    39fac5f48b832bd1ca8349dee8c3dfa27dfd97b7669f29565b940b9e1a326864a10672f3263e0b2f9be3701e145cad33c92735e4ea94ba98e027982b3d4d195e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef1c1eba7f75de132a6daaccdfc208b3

    SHA1

    87178f370355e6d8ce6921c5c2516e21e99a09c1

    SHA256

    dabf997564016ecb63944dbc7b1087feed04bcdbb6babaeae280911709711236

    SHA512

    bc3679c96e432df1c507b4d2996a3ac40cfa77017cd8af8380c6161adba1f22c25d3db7de649b06eaed5a66d46112d44de6487a3a0748c55fa5b625ee59159ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    268733d208e2aadf54b09692df05b383

    SHA1

    32e38cce573c3baed9593bef18ea3134503638a8

    SHA256

    b08e563670324131833120053061c4e29b3ad84c102ac4ef7bfe082fe642b5c8

    SHA512

    b09f4d1a329f0a4201bb267dbc5c33ad8c584b2098443781b679520c378dd08cecf0884d15db41c704bd609b093ffe783ad783116cb33b41e75b66f3005cd3b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aaac313edc4e864ff251d82995cd965

    SHA1

    512c7eabc1d539115670a651e6127e979ff08ec4

    SHA256

    2caf6afd01dbfc1a28b4889b3ea3d02346f76fa8d5cc2bb62447cfe5c29c5ae2

    SHA512

    55c67a3aef2d2d43f99154fcfbedc7c9b59f9c3f529cc85a170161f219b6917dd78da0eab7940e4990921eee9a10472bb5abeccba56437a448021538d12526dc

  • C:\Users\Admin\AppData\Local\Temp\Cab119E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar12AC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Nyueur.exe

    Filesize

    152KB

    MD5

    ea749825dbeff15b30a733c4505514fb

    SHA1

    983cf7614bccf1f9dc736912747ec2cd3f5e3627

    SHA256

    498cea45e4cd6ee432e71943548de2861e75062b5d1e4101da66d14c515004b4

    SHA512

    c3c8e3f1c13ffeee3b6df6fb8fd62f2a96c26f224aa862d47e1d3960bd8d7132df131a3d0388756ad8efd6464284221b19ff7dfd4b8e38bd3bdbff0c827c2025

  • memory/996-17-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/996-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/996-2-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/996-1-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2444-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-918-0x0000000000230000-0x000000000025D000-memory.dmp

    Filesize

    180KB

  • memory/2444-3-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-30-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-31-0x0000000000230000-0x000000000025D000-memory.dmp

    Filesize

    180KB

  • memory/2444-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2444-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2696-56-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2696-55-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3056-34-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/3056-37-0x0000000000220000-0x000000000024D000-memory.dmp

    Filesize

    180KB

  • memory/3056-33-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/3056-54-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB